EP0885503B1 - Procede et systeme de creation d'une interface cryptographique de toute securite entre la machine de decryptage et le decodeur du systeme d'un televiseur numerique - Google Patents
Procede et systeme de creation d'une interface cryptographique de toute securite entre la machine de decryptage et le decodeur du systeme d'un televiseur numerique Download PDFInfo
- Publication number
- EP0885503B1 EP0885503B1 EP97946000A EP97946000A EP0885503B1 EP 0885503 B1 EP0885503 B1 EP 0885503B1 EP 97946000 A EP97946000 A EP 97946000A EP 97946000 A EP97946000 A EP 97946000A EP 0885503 B1 EP0885503 B1 EP 0885503B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- bitstream
- decrypted
- decryption engine
- scrambling
- scrambled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims description 28
- 238000004806 packaging method and process Methods 0.000 claims description 2
- 230000000295 complement effect Effects 0.000 description 13
- 230000001360 synchronised effect Effects 0.000 description 7
- 230000002441 reversible effect Effects 0.000 description 5
- 238000013478 data encryption standard Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 3
- 230000000670 limiting effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 239000004593 Epoxy Substances 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4385—Multiplex stream processing, e.g. multiplex stream decrypting
- H04N21/43853—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
Definitions
- the present invention relates generally to security measures for digital receivers, and more particularly, to a method and apparatus for providing a cryptographically secure interface between the decryption engine and the system decoder of a digital television receiver.
- a variety of systems have been developed to prevent piracy of digital television signals in present and future cable or satellite subscription digital television systems (e.g., digital television systems based on the MPEG-2 digital video compression standard, as described in the ISO/IEC 13818 document, such as the ATSC Digital Television Standard).
- the digital television signals are encrypted by the service provider prior to transmission, and then decrypted upon reception.
- a system subscriber is provided with a digital television receiver which includes a decryption engine (contained in either a separate set-top box or integrated within the digital television receiver itself) connected between the cable feed or satellite receiver and the subscriber's television set.
- decryption engine contained in either a separate set-top box or integrated within the digital television receiver itself
- There are several well-known encryption algorithms which can be utilized, including the Diffie-Hellman, RSA (Rivest-Shamir-Adleman), and DES (Data Encryption Standard) encryption algorithms.
- the decryption engine decrypts the encrypted television signal received by the digital television receiver in accordance with the corresponding decryption algorithm, using both a public key which depends upon the particular encryption algorithm employed, and a private key which is unknown and concealed within the decryption engine.
- the integrity of the security afforded by such systems depends upon preservation of the secrecy of the private key.
- the most secure method of implementing the decryption engine is to integrate the decryption engine onto the same die as the system decoder to thereby provide an integrated circuit (IC).
- IC integrated circuit
- a system decoder de-multiplexes the Packetized Elementary Streams (PES) from the Transport Stream.
- PES Packetized Elementary Streams
- MPEG-2 type streams it is possible to (a) take PES packets and form Transport Packet from them. The Transport Packets can then be encrypted. It is also possible to (b) encrypt the PES packets, then from the encrypted PES packet form Transport Packets, which are delivered as is.
- (c) encrypt data in PES packets, then form Transport Packets from the encrypted PES data, and have each Transport Packet payload encrypted again. If method (a) is used, then the digital receiver should decrypt the Transport Packet payload first, then perform the de-multiplexing required to recover the PES packet (decryption before de-multiplexing). If method (b) is used, the digital receiver should de-multiplex the Transport Packets to form the encrypted PES packet, then decrypt the PES packet (decryption after de-multiplexing). If method (c) is used, then decryption before and after de-multiplexing will be required.
- the system decoder and decryption engine are connected by wiring internal to the IC, using specialized masks and layouts which make reverse engineering of the decryption engine very difficult.
- a hard-wired IC does not afford a great deal of flexibility to the system designer, since it can not be modified and thus, can support only a single encryption scheme, to the exclusion of all others.
- separate ICs which are specifically designed to support different, respective encryption algorithms must be employed for services which utilize different encryption algorithms.
- a more flexible method of implementing the decryption engine is to use a general purpose digital signal processing device (e.g., a field programmable gate/logic array (FPGA or FPLA) or ASIC core) which can be reconfigured with software to support different encryption algorithms.
- a general purpose digital signal processing device e.g., a field programmable gate/logic array (FPGA or FPLA) or ASIC core
- FPGA or FPLA field programmable gate/logic array
- ASIC core A more flexible method of implementing the decryption engine
- Another method of implementing the decryption engine is to implement the decryption engine and the system decoder on separate chips, so that the decryption engine is off-chip from the system decoder. In this way, different decryption engines may be utilized by simply substituting chips.
- this is a particularly flexible method of implementing the decryption engine, the system security is compromised due to the exposure of the interconnect between the system decoder and the decryption engine to the outside world, and the resultant vulnerability of the exposed interconnect to the following type of attack.
- an attacker can read the cipher text (i.e., the encrypted bitstream) from the interconnect (e.g., from a first parallel or serial data bus), and the corresponding plain text (i.e., the decrypted bitstream) from the interconnect (e.g., from a second parallel or serial data bus).
- Access to the cipher text and plain text enables an attacker to perform known-plain text, and chosen cipher text attacks on the decryption engine in an attempt to recover all or part of the private key.
- cryptanalysis an attack to recover the private key or the entitlement key of a decryption scheme is known as cryptanalysis.
- a special subset of cryptanalysis is called differential cryptanalysis, and is effective on the DES encryption/decryption scheme.
- an attacker could employ a chosen-cipher text attack so that a differential cryptanalysis could be performed on the decryption engine, thereby recovering the entitlement key.
- an exposed interface allows an attacker to employ laboratory equipment to supply cipher text and measure corresponding plain text without difficulty. Under such conditions, an attacker needs to know only the encryption scheme employed, and the public key of the service provider and/or of the client (subscriber).
- the individual subscriber's set-top box is provided with an encryption engine and a transmitter, so that the subscriber can input data (e.g., via a keypad) which is encrypted and "signed" for authentication with the private key prior to transmission.
- the attacker who uncovers the private key can also use the private key to impersonate the legitimate subscriber.
- US-A 5,511,125 discloses an interface for a device for the exploitation of electrical signals between a receiver of this device and a device for the exploitation of these signals.
- the interface is capable of sending, alternatively, signals received by the receiver to an external circuit and signals delivered by the external circuit to the exploitation circuit.
- the interface enables the direct connection, without digital/analog conversion, of synthesis video generators such as subtitling machines, games terminals and personal computers.
- the interface further enables the function of unscrambling digital television signals to be transferred to a detachable element.
- An object of the invention is to provide a secure interface between a decryption engine and a system decoder of a digital receiver, e.g., an MPEG-2 digital television receiver.
- the invention provides a method for providing a secure interface, a digital receiver, a system decoder and a decryption engine as defined in the independent claims.
- Advantageous embodiments are defined in the dependent claims.
- the system decoder receives an encrypted bitstream and produces a cipher text bitstream which is supplied to the decryption engine via a first parallel data bus which includes a plurality N of parallel bit lines corresponding to respective N bits of the cipher text bitstream.
- the decryption engine decrypts the cipher text bitstream and produces a plain text bitstream which is supplied to the system decoder via a second parallel data bus which includes a plurality N of parallel bit lines corresponding to respective N bits of the plain text bitstream.
- the method includes the steps of scrambling the bit order of the N bits of the cipher text bitstream on the respective N bit lines of the first data bus, to thereby produce a scrambled cipher text bitstream N-bits wide, descrambling the bit order of the N bits of the scrambled cipher text bitstream, to thereby produce a descrambled cipher text bitstream which is the same as the original cipher text bitstream, employing the decryption engine to decrypt the descrambled cipher text bitstream, to thereby produce the plain text bitstream, scrambling the bit order of the N bits of the plain text bitstream on the respective N bit lines of the second data bus, to thereby produce a scrambled plain text bitstream N-bits wide, and, descrambling the bit order of the N bits of the scrambled plain text bitstream, to thereby produce a descrambled plain text bitstream which is the same as the original plain text bitstream.
- the step of scrambling the bit order of the N bits of the cipher text bitstream is performed in accordance with a first bit-scrambling algorithm, and the step of scrambling the bit order of the N bits of the plain text bitstream is performed in accordance with a second bit-scrambling algorithm.
- the first and second bit-scrambling algorithms may either be the same or different.
- the first bit-scrambling algorithm is a different one of a plurality of possible first bit-scrambling algorithms for each of a plurality of successive power-up cycles of the digital receiver
- the second bit-scrambling algorithm is a different one of a plurality of different possible second bit-scrambling algorithms for each separate power-up cycle of the digital receiver.
- the step of descrambling the bit order of the N bits of the scrambled cipher text bitstream is performed in accordance with a first bit-descrambling algorithm which is the inverse of the first bit-scrambling algorithm
- the step of descrambling the bit order of the N bits of the scrambled plain text bitstream is performed in accordance with a second bit-descrambling algorithm which is the inverse of the second bit-scrambling algorithm.
- the present invention also encompasses a digital receiver which includes a system decoder for receiving an encrypted bitstream and producing a cipher text bitstream, a decryption engine for decrypting the cipher text bitstream and producing a plain text bitstream, a first parallel data bus which includes a plurality N of parallel bit lines coupled between a parallel output port of the system decoder and a parallel input port of the decryption engine, a second parallel data bus which includes a plurality N of parallel bit lines coupled between a parallel output port of the decryption engine and a parallel input port of the system decoder.
- the system decoder includes a cipher text scrambler module for scrambling the bit order of N bits of the cipher text bitstream on the N bit lines of the first data bus, to thereby produce a scrambled cipher text bitstream N-bits wide which is supplied to the parallel input port of the decryption engine via the first parallel data bus.
- the decryption engine includes a cipher text descramble module for descrambling the bit order of the N bits of the scrambled cipher text bitstream, to thereby produce a descrambled cipher text bitstream which is the same as the original cipher text bitstream.
- the decryption engine further includes a plain text scramble module for scrambling the bit order of N bits of the plain text bitstream on the N bit lines of the second data bus, to thereby produce a scrambled plain text bitstream N-bits wide which is supplied to the parallel input port of the system decoder via the second parallel data bus.
- the system decoder further includes a plain text descramble module for descrambling the bit order of the N bits of the scrambled plain text bitstream, to thereby produce a descrambled plain text bitstream which is the same as the original plain text bitstream.
- system decoder and the decryption engine are preferably coupled to a common power source and are power-cycled together, whereby the first and second state machines synchronously cycle through respective sequences of complementary first and second states over a plurality of successive power-up cycles, and the third and fourth state machines synchronously cycle through respective sequences of complementary third and fourth states over a plurality of successive power-up cycles.
- a digital receiver 10 e.g., an MPEG-2 digital television receiver, includes a decryption engine 12 and a system decoder 14 which communicate with one another via a pair of data busses 16, 18, e.g., 16-bit wide parallel data busses, which together comprise the interconnect between the decryption engine 12 and the system decoder 14.
- the system decodes 14 includes, in addition to its usual decoder circuitry, a cipher text scramble circuit or module 20 and a plain text descramble circuit or module 22, and the decryption engine 12 includes, in addition to its usual decryption circuitry, a cipher text descramble circuit or module 24 and a plain text scramble circuit or module 26.
- the cipher text scramble module 20 of the system decoder 14 and the cipher text descramble module 24 of the decryption engine 12 communicate via the 16-bit wide parallel bus 16, and the plain text scramble module 26 of the decryption engine 12 and the plain text descramble module 22 of the system decoder 14 communicate via the 16-bit wide parallel bus 18.
- the bit order (bit position) of the bits comprising the cipher text bitstream is scrambled by the cipher text scramble module 20 of the system decoder 14, in accordance with any suitable bit-scrambling algorithm.
- the odd-numbered bits of the cipher text bitstream could be placed on the even-numbered bit lines of the parallel data bus 16
- the even-numbered bits of the cipher text bitstream could be placed on the odd-numbered bit lines of the parallel data bus 16.
- the particular bit-scrambling algorithm employed in scrambling the bit order of the cipher text bitstream is not in any way limiting to the present invention.
- the bit order of the bits comprising the plain text bitstream produced by the decryption engine 12 is scrambled by the plain text scramble module 26 of the decryption engine 12, in accordance with any suitable bit-scrambling scheme.
- the odd-numbered bits of the plain text bitstream could be placed on the even-numbered bit lines of the parallel data bus 18, and the even-numbered bits of the plain text bitstream could be placed on the odd-numbered bit lines of the parallel data bus 18.
- the particular bit-scrambling algorithm employed to scramble the bit order of the plain text bitstream is also not in any way limiting to the present invention. In this connection, it will be appreciated that the bit-scrambling algorithm used to scramble the bit order of the cipher and plain text bitstreams may be the same or different.
- the plain text descramble module 22 of the system decoder 14 then functions to descramble the bit order of the scrambled plain text bitstream received over the parallel data bus 18 by executing a bit-descrambling algorithm which is the inverse of the bit-scrambling algorithm executed by the plain text scramble module 26 of the decryption engine 12 to thereby produce a descrambled plain text bitstream, which is subsequently processed in the normal manner.
- this is accomplished by implementing the cipher text scramble module 20 and the cipher text descramble module 24 as complementary state machines, and by implementing the plain text scramble module 26 and the plain text descramble module 22 as complementary state machines.
- Each pair of compelementary state machines will cycle through a plurality of different complementary states corresponding to a plurality of different bit-scrambling/descrambling algorithms, e.g., on successive power-up cycles of the digital television receiver 10.
- the state machines are configured to have a large number of states, so that they do not "wrap around" and repeat the same pattern of states in a short period of successive power-up cycles.
- the interconnect between the decryption engine 12 and the system decoder 14 is comprised of a pair of 16-bit wide parallel data busses 16, 18, there are, in theory, 2 16 different possible bit patterns (and thus, 2 16 possible states of the respective state machines) which could be invoked in order to scramble the order (position) of the bits of the 2-byte words carried by the 16-bit wide parallel data busses 16, 18.
- the state machines are identical. Each state machine has the same initialization vector. When the power is cycled, the next state in the state machine is realized. Since the decryption engine 12 and the system decoder 14 are coupled to a common power supply, they are power-cycled together, so that the state machines in each the decryption engine 12 and the system decoder 14 are intrinsically synchronized. The output of each state machine (for a given input) is dependent upon the current state of that state machine. Thus, the bit-scrambling/descrambling algorithm executed by each state machine is dependent upon its current state (or seed state).
- the requirement that the cipher text scramble module 20 of the system decoder 14 and the cipher text descramble module 24 of the decryption engine 12 be synchronized in such a manner as to run the complementary bit-scrambling/descrambling algorithms at the same time, at all times, and that the plain text scramble module 26 of the decryption engine 12 and the plain text descramble module 22 of the system decoder 14 be synchronized in such a manner as to run the complementary bit-scrambling/descrambling algorithms at the same time, at all times, can be easily satisfied by configuring the cipher text scramble module 20 state machine and the cipher text descramble module 24 state machine to cycle through the same number of complementary states during successive power-up cycles, and by configuring the plain text scramble module 26 and the plain text descramble module 22 to cycle through the same number of complementary states during successive power-up cycles.
- the interface therebetween will be "out of sync", thereby preventing any communication therebetween. If this occurs, it is preferable that this "out of sync" status not be correctable by any means (hardware or software) within the system, since this would compromise the cryptographical security of the system.
- the following four additional anti-piracy measures can be taken in order to increase the difficulty and cost-to-reward ratio of attacking the system:
- the cipher text descramble module 24, the plain text scramble module 26, and the plain text descramble module 22 could be implemented as signal processing circuits under the control of respective state machines, with the output of the state machines being utilized as control signals.
- the output of the state machines could be used as addresses to look-up different bit patterns (bit position combinations) stored in a read-only (ROM), or as seed states for linear feedback shift registers (LFSR's) generating bit patterns.
- the output of the state machines could be transformed by the respective signal processing circuits in order to produce the final bitstreams.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Claims (18)
- Procédé pour procurer une interface (16, 18) entre un moteur de déchiffrement (12) et un décodeur de système (14) d'un récepteur numérique (10), dans lequel le décodeur de système (14) reçoit un train de bits chiffré, lequel est fourni (16) au moteur de déchiffrement (12), et dans lequel le moteur de déchiffrement (12) déchiffre le train de bits chiffré;
le procédé étant caractérisé en ce qu'il comporte les étapes suivantes :brouillage (20) dans ledit décodeur de système (14) du train de bits chiffré, afin de produire ainsi un train de bits chiffré brouillé;désembrouillage (24) dans ledit moteur de déchiffrement (12) du train de bits chiffré brouillé, afin de produire ainsi un train de bits chiffré désembrouillé, lequel est identique au train de bits chiffré d'origine;utilisation (12) du moteur de déchiffrement (12) pour déchiffrer le train de bits chiffré désembrouillé, afin de produire ainsi un train de bits déchiffré;brouillage (26) dans ledit moteur de déchiffrement (12) du train de bits déchiffré, afin de produire ainsi un train de bits déchiffré brouillé, etdésembrouillage (22) dans ledit décodeur de système (14) du train de bits déchiffré brouillé, afin de produire ainsi un train de bits déchiffré désembrouillé, lequel est identique au train de bits déchiffré d'origine. - Procédé suivant la revendication 1, dans lequel :le train de bits chiffré brouillé est fourni, au moteur de déchiffrement (12) par le biais d'un premier bus de données parallèle, lequel comporte une pluralité N de lignes de bits parallèles correspondant à N bits respectifs du train de bits chiffré brouillé;le train de bits déchiffré brouillé est fourni au décodeur de système (14) par le biais d'un second bus de données parallèle, lequel comporte une pluralité N de lignes de bits parallèles correspondant à N bits respectifs du train de bits déchiffré brouillé;l'étape de brouillage du train de bits chiffré comprend le brouillage de l'ordre des bits des N bits du train de bits chiffré sur les N lignes de bits respectives du premier bus de données, etl'étape de brouillage du train de bits déchiffré comprend le brouillage de l'ordre des bits des N bits du train de bits déchiffré sur les N lignes de bits respectives du second bus de données.
- Procédé suivant la revendication 1, dans lequel :le train de bits chiffré brouillé est fourni au moteur de déchiffrement (12) par le biais d'un premier bus de données parallèle (16), lequel comporte une pluralité N de lignes de bits parallèles correspondant à N bits respectifs du train de bits chiffré brouillé;le train de bits déchiffré brouillé est fourni au décodeur de système (14) par le biais d'un second bus de données parallèle (18), lequel comporte une pluralité N de lignes de bits parallèles correspondant à N bits respectifs du train de bits déchiffré brouillé;l'étape de brouillage du train de bits chiffré comprend le retardement de chacun des N bits respectifs du train de bits chiffré à raison d'une période de temps variable, etl'étape de brouillage du train de bits déchiffré comprend le retardement de chacun des N bits respectifs du train de bits déchiffré à raison d'une période de temps variable.
- Procédé suivant la revendication 1, dans lequel :l'étape de brouillage du train de bits chiffré est exécutée suivant un premier algorithme de brouillage de bits, etl'étape de brouillage du train de bits déchiffré est exécutée suivant un second algorithme de brouillage de bits.
- Procédé suivant la revendication 4, dans lequel les premier et second algorithmes de brouillage de bits sont identiques.
- Procédé suivant la revendication 4, dans lequel les premier et second algorithmes de brouillage de bits sont différents.
- Procédé suivant la revendication 4, dans lequel le premier algorithme de brouillage de bits est un différent de plusieurs premiers algorithmes de brouillage de bits possibles pour chacun de plusieurs cycles de mise sous tension successifs du récepteur numérique.
- Procédé suivant la revendication 4, dans lequel le second algorithme de brouillage de bits est un différent de plusieurs seconds algorithmes de brouillage de bits possibles pour chacun de plusieurs cycles de mise sous tension successifs du récepteur numérique.
- Récepteur numérique (10) comportant :un décodeur de système (14) pour recevoir un train de bits chiffré, etun moteur de déchiffrement (12) pour déchiffrer le train de bits chiffré et produire un train de bits déchiffré,le récepteur numérique étant caractérisé en ce qu'il comporte :un premier module de brouillage (20) intégré dans ledit décodeur de système (14) pour brouiller le train de bits chiffré, afin de produire ainsi un train de bits chiffré brouillé;un premier module de désembrouillage (24) intégré dans ledit moteur de déchiffrement (12) pour désembrouiller le train de bits chiffré brouillé, afin de produire ainsi un train de bits chiffré désembrouillé, lequel est identique au train de bits chiffré d'origine;un second module de brouillage (26) intégré dans le moteur de déchiffrement (12) pour brouiller le train de bits déchiffré, afin de produire ainsi un train de bits déchiffré brouillé, etun second module de désembrouillage (22) intégré dans ledit décodeur de système (14) pour désembrouiller le train de bits déchiffré brouillé, afin de produire ainsi un train de bits déchiffré désembrouillé, lequel est identique au train de bits déchiffré d'origine.
- Récepteur numérique (10) suivant la revendication 9, dans lequel le récepteur numérique comporte un téléviseur numérique.
- Récepteur numérique (10) suivant la revendication 9, dans lequel ledit décodeur de système (14) et ledit moteur de déchiffrement (12) sont mis en oeuvre sous la forme de première et seconde puces séparées.
- Récepteur numérique suivant la revendication 11, comportant en outre des premier et second boítiers BGA pour mettre sous boítier lesdites première et seconde puces.
- Décodeur de système (14) pour recevoir un train de bits chiffré, le décodeur de système (14) étant caractérisé en ce qu'il comporte :un module de brouillage (20) pour brouiller le train de bits chiffré, afin de produire ainsi un train de bits chiffré brouillé à fournir à un moteur de déchiffrement (12), etun module de désembrouillage (22) pour désembrouiller un train de bits déchiffré brouillé produit par le moteur de déchiffrement (12), afin de produire ainsi un train de bits déchiffré désembrouillé.
- Moteur de déchiffrement (12) pour déchiffrer un train de bits chiffré et produire un train de bits déchiffré, le moteur de déchiffrement (12) étant caractérisé en ce qu'il comporte :un module de désembrouillage (24) pour désembrouiller un train de bits chiffré brouillé afin de produire ainsi un train de bits chiffré, etun module de brouillage (26) pour brouiller le train de bits déchiffré, afin de produire ainsi un train de bits déchiffré brouillé.
- Procédé pour procurer une interface (16, 18) entre un moteur de déchiffrement (12) et un décodeur de système (14) d'un récepteur numérique (10), dans lequel le moteur de déchiffrement (12) déchiffre un train de bits chiffré afin de produire un train de bits déchiffré;
le procédé étant caractérisé en ce qu'il comporte les étapes suivantes :brouillage (26) dans ledit moteur de déchiffrement (12) du train de bits déchiffré, afin de produire ainsi un train de bits déchiffré brouillé;désembrouillage (22) dans ledit décodeur de système (14) du train de bits déchiffré brouillé, afin de produire ainsi un train de bits déchiffré désembrouillé, lequel est identique au train de bits déchiffré d'origine. - Récepteur numérique (10) comportant :un moteur de déchiffrement (12) pour déchiffrer un train de bits chiffré et produire un train de bits déchiffré, etun décodeur de système (14),le récepteur numérique étant caractérisé en ce qu'il comporte :un module de brouillage (26) intégré dans ledit moteur de déchiffrement (12) pour brouiller le train de bits déchiffré, afin de produire ainsi un train de bits déchiffré brouillé; etun module de désembrouillage (22) intégré dans ledit décodeur de système (14) pour désembrouiller le train de bits déchiffré brouillé, afin de produire ainsi un train de bits déchiffré désembrouillé, lequel est identique au train de bits déchiffré d'origine.
- Décodeur de système (14) caractérisé en ce qu'il comporte :un module de désembrouillage (22) pour désembrouiller un train de bits déchiffré brouillé produit par un moteur de déchiffrement (12), afin de produire ainsi un train de bits déchiffré désembrouillé.
- Moteur de déchiffrement (12) pour déchiffrer un train de bits chiffré et produire un train de bits déchiffré, le moteur de déchiffrement (12) étant caractérisé en ce qu'il comporte :un module de brouillage (26) pour brouiller le train de bits déchiffré afin de produire ainsi un train de bits déchiffré brouillé.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/768,489 US5818934A (en) | 1996-12-18 | 1996-12-18 | Method and apparatus for providing a cryptographically secure interface between the decryption engine and the system decoder of a digital television receiver |
US768489 | 1996-12-18 | ||
PCT/IB1997/001558 WO1998027687A2 (fr) | 1996-12-18 | 1997-12-11 | Procede et systeme de creation d'une interface cryptographique de toute securite entre la machine de decryptage et le decodeur du systeme d'un televiseur numerique |
Publications (3)
Publication Number | Publication Date |
---|---|
EP0885503A2 EP0885503A2 (fr) | 1998-12-23 |
EP0885503A3 EP0885503A3 (fr) | 1999-12-29 |
EP0885503B1 true EP0885503B1 (fr) | 2003-05-07 |
Family
ID=25082644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP97946000A Expired - Lifetime EP0885503B1 (fr) | 1996-12-18 | 1997-12-11 | Procede et systeme de creation d'une interface cryptographique de toute securite entre la machine de decryptage et le decodeur du systeme d'un televiseur numerique |
Country Status (5)
Country | Link |
---|---|
US (1) | US5818934A (fr) |
EP (1) | EP0885503B1 (fr) |
JP (1) | JP4302189B2 (fr) |
DE (1) | DE69721743T2 (fr) |
WO (1) | WO1998027687A2 (fr) |
Families Citing this family (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6020189A (en) * | 1996-08-30 | 2000-02-01 | The Johns Hopkins University School Of Medicine | Fibroblast growth factor homologous factors (FHFs) and methods of use |
GB9704630D0 (en) * | 1997-03-06 | 1997-04-23 | Lsi Logic Corp | Digital video broadcasting |
GB9704638D0 (en) * | 1997-03-06 | 1997-04-23 | Lsi Logic Corp | Digital video broadcasting |
US8584255B2 (en) * | 1999-05-05 | 2013-11-12 | Sony United Kingdom Limited | Networked conditional access module |
US7305695B1 (en) | 1999-01-20 | 2007-12-04 | Intel Corporation | System for providing video on demand with pause feature |
US6697489B1 (en) | 1999-03-30 | 2004-02-24 | Sony Corporation | Method and apparatus for securing control words |
US7730300B2 (en) | 1999-03-30 | 2010-06-01 | Sony Corporation | Method and apparatus for protecting the transfer of data |
US7085377B1 (en) * | 1999-07-30 | 2006-08-01 | Lucent Technologies Inc. | Information delivery in a multi-stream digital broadcasting system |
US7039614B1 (en) * | 1999-11-09 | 2006-05-02 | Sony Corporation | Method for simulcrypting scrambled data to a plurality of conditional access devices |
US7225164B1 (en) | 2000-02-15 | 2007-05-29 | Sony Corporation | Method and apparatus for implementing revocation in broadcast networks |
JP2001309247A (ja) * | 2000-04-19 | 2001-11-02 | Matsushita Electric Ind Co Ltd | 高周波信号受信装置 |
US20030206631A1 (en) * | 2000-06-22 | 2003-11-06 | Candelore Brant L. | Method and apparatus for scrambling program data for furture viewing |
US7203311B1 (en) | 2000-07-21 | 2007-04-10 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device |
US7895616B2 (en) | 2001-06-06 | 2011-02-22 | Sony Corporation | Reconstitution of program streams split across multiple packet identifiers |
US7747853B2 (en) | 2001-06-06 | 2010-06-29 | Sony Corporation | IP delivery of secure digital content |
US7151831B2 (en) | 2001-06-06 | 2006-12-19 | Sony Corporation | Partial encryption and PID mapping |
US7242773B2 (en) | 2002-09-09 | 2007-07-10 | Sony Corporation | Multiple partial encryption using retuning |
US7292690B2 (en) | 2002-01-02 | 2007-11-06 | Sony Corporation | Video scene change detection |
US7218738B2 (en) | 2002-01-02 | 2007-05-15 | Sony Corporation | Encryption and content control in a digital broadcast system |
US7823174B2 (en) | 2002-01-02 | 2010-10-26 | Sony Corporation | Macro-block based content replacement by PID mapping |
EP1461950B1 (fr) * | 2002-01-02 | 2016-03-09 | Sony Electronics, Inc. | Decodage et dechiffrement d'information partiellement chiffree |
US7039938B2 (en) | 2002-01-02 | 2006-05-02 | Sony Corporation | Selective encryption for video on demand |
US7765567B2 (en) | 2002-01-02 | 2010-07-27 | Sony Corporation | Content replacement by PID mapping |
US7221757B2 (en) * | 2002-08-15 | 2007-05-22 | Opentv, Inc. | Method and system for accelerated data encryption |
US8818896B2 (en) | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
US7724907B2 (en) | 2002-11-05 | 2010-05-25 | Sony Corporation | Mechanism for protecting the transfer of digital content |
US8572408B2 (en) | 2002-11-05 | 2013-10-29 | Sony Corporation | Digital rights management of a digital device |
US8645988B2 (en) | 2002-12-13 | 2014-02-04 | Sony Corporation | Content personalization for digital content |
US8667525B2 (en) | 2002-12-13 | 2014-03-04 | Sony Corporation | Targeted advertisement selection from a digital stream |
IL155416A0 (en) * | 2003-04-13 | 2003-11-23 | Nds Ltd | System for securing access to data streams |
US7853980B2 (en) | 2003-10-31 | 2010-12-14 | Sony Corporation | Bi-directional indices for trick mode video-on-demand |
CN100356342C (zh) * | 2003-11-18 | 2007-12-19 | 株式会社瑞萨科技 | 信息处理装置 |
US7590243B2 (en) | 2004-05-04 | 2009-09-15 | The Directv Group, Inc. | Digital media conditional access system for handling digital media content |
US8041190B2 (en) | 2004-12-15 | 2011-10-18 | Sony Corporation | System and method for the creation, synchronization and delivery of alternate content |
US7895617B2 (en) | 2004-12-15 | 2011-02-22 | Sony Corporation | Content substitution editor |
TWI289406B (en) * | 2005-07-12 | 2007-11-01 | Coretronic Corp | Television signal-receiving module |
US9325944B2 (en) | 2005-08-11 | 2016-04-26 | The Directv Group, Inc. | Secure delivery of program content via a removable storage medium |
US8185921B2 (en) | 2006-02-28 | 2012-05-22 | Sony Corporation | Parental control of displayed content using closed captioning |
US8775319B2 (en) | 2006-05-15 | 2014-07-08 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
US7992175B2 (en) | 2006-05-15 | 2011-08-02 | The Directv Group, Inc. | Methods and apparatus to provide content on demand in content broadcast systems |
US8996421B2 (en) | 2006-05-15 | 2015-03-31 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems |
US8095466B2 (en) | 2006-05-15 | 2012-01-10 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems |
US8001565B2 (en) | 2006-05-15 | 2011-08-16 | The Directv Group, Inc. | Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems |
US9679602B2 (en) | 2006-06-14 | 2017-06-13 | Seagate Technology Llc | Disc drive circuitry swap |
US9225761B2 (en) | 2006-08-04 | 2015-12-29 | The Directv Group, Inc. | Distributed media-aggregation systems and methods to operate the same |
US9178693B2 (en) | 2006-08-04 | 2015-11-03 | The Directv Group, Inc. | Distributed media-protection systems and methods to operate the same |
EP2119230B1 (fr) * | 2007-01-11 | 2013-07-03 | NDS Limited | Traitement de contenu vidéo |
US8000467B2 (en) * | 2007-03-19 | 2011-08-16 | Stmicroelectronics Sa | Data parallelized encryption and integrity checking method and device |
US9305590B2 (en) | 2007-10-16 | 2016-04-05 | Seagate Technology Llc | Prevent data storage device circuitry swap |
US7726579B2 (en) * | 2008-01-10 | 2010-06-01 | Sony Corporation | In-chassis TV chip with dynamic purse |
US10057641B2 (en) | 2009-03-25 | 2018-08-21 | Sony Corporation | Method to upgrade content encryption |
US8379847B2 (en) * | 2010-06-30 | 2013-02-19 | International Business Machines Corporation | Data and control encryption |
US10568202B2 (en) | 2017-07-25 | 2020-02-18 | International Business Machines Corporation | Tamper-respondent assembly with interconnect characteristic(s) obscuring circuit layout |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4944006A (en) * | 1987-03-12 | 1990-07-24 | Zenith Electronics Corporation | Secure data packet transmission system and method |
US5204900A (en) * | 1991-03-04 | 1993-04-20 | Pires H George | Coding system for descrambling video |
JP3010930B2 (ja) * | 1992-09-24 | 2000-02-21 | 松下電器産業株式会社 | 記録再生装置 |
FR2704703B1 (fr) * | 1993-04-28 | 1995-06-30 | Gemplus Card Int | Appareil d'exploitation de signaux electriques. |
JPH0730855A (ja) * | 1993-07-08 | 1995-01-31 | Sony Corp | ビデオデータの記録方法 |
KR0166923B1 (ko) * | 1995-09-18 | 1999-03-20 | 구자홍 | 디지탈 방송 시스템의 불법 시청 및 복사 방지방법 및 장치 |
-
1996
- 1996-12-18 US US08/768,489 patent/US5818934A/en not_active Expired - Fee Related
-
1997
- 1997-12-11 WO PCT/IB1997/001558 patent/WO1998027687A2/fr active IP Right Grant
- 1997-12-11 DE DE69721743T patent/DE69721743T2/de not_active Expired - Fee Related
- 1997-12-11 JP JP52749398A patent/JP4302189B2/ja not_active Expired - Fee Related
- 1997-12-11 EP EP97946000A patent/EP0885503B1/fr not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
JP2000507072A (ja) | 2000-06-06 |
DE69721743T2 (de) | 2004-03-18 |
WO1998027687A3 (fr) | 1998-08-20 |
JP4302189B2 (ja) | 2009-07-22 |
WO1998027687A2 (fr) | 1998-06-25 |
EP0885503A3 (fr) | 1999-12-29 |
DE69721743D1 (de) | 2003-06-12 |
EP0885503A2 (fr) | 1998-12-23 |
US5818934A (en) | 1998-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0885503B1 (fr) | Procede et systeme de creation d'une interface cryptographique de toute securite entre la machine de decryptage et le decodeur du systeme d'un televiseur numerique | |
EP0891670B1 (fr) | Procede servant a etablir une communication sure entre deux dispositifs et mise en application du procede | |
KR101345569B1 (ko) | 데이터 유닛들을 스크램블 및 디스크램블 하는 방법들 | |
AU749748B2 (en) | Method for protecting the audio/visual data across the NRSS interface | |
US6934389B2 (en) | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus | |
US7945047B2 (en) | Cryptographic key distribution system and method for digital video systems | |
EP2219374A1 (fr) | Fourniture sécurisée d'un mot de commande à partir d'une carte intelligente pour module d'accès conditionnel | |
WO2012072703A1 (fr) | Protection de mot de commande | |
JP2007184929A (ja) | スクランブルされたコンテンツデータオブジェクトをデスクランブルする方法 | |
KR20020040796A (ko) | 디지털 비디오 컨텐츠 전송의 암호화 및 복호화 방법 및장치 | |
JP2012510743A (ja) | 追加キーレイヤーを用いたコンテンツ復号化装置および暗号化システム | |
WO2011120901A1 (fr) | Désembrouillage sécurisé d'un flux de données audio/vidéo | |
CA2073784C (fr) | Appareil de communication a confidentialite | |
US7502475B2 (en) | Method and system for secure key generation | |
US20060098822A1 (en) | Interoperable conditional access receptors without consensual key sharing | |
JP4620865B2 (ja) | サービス・プロバイダのイベントを表す信号へのアクセスを管理する方法 | |
JP2008294707A (ja) | デジタル放送受信装置 | |
KR20080016038A (ko) | 메세지 교환 방법 및 메세지 교환 장치 | |
KR0174930B1 (ko) | 피엔키 암호화 방법 | |
KR0170964B1 (ko) | 케이블 텔레비젼의 피엔키 암호화 방법 | |
CA2250833C (fr) | Procede servant a etablir une communication sure entre deux dispositifs et mise en application du procede | |
KR0185987B1 (ko) | 스크램블/디스크램블 장치 | |
KR0159400B1 (ko) | 케이블 텔레비젼의 피엔키 암호화 및 복호화 방법 | |
JPH05336136A (ja) | ループ型ローカルエリアネットワーク暗号化装置 | |
JP2002084517A (ja) | スクランブル方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
PUAK | Availability of information related to the publication of the international search report |
Free format text: ORIGINAL CODE: 0009015 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): DE FR GB |
|
RIC1 | Information provided on ipc code assigned before grant |
Free format text: 6H 04N 7/167 A, 6H 04N 5/913 B |
|
17P | Request for examination filed |
Effective date: 19990222 |
|
17Q | First examination report despatched |
Effective date: 20000731 |
|
GRAG | Despatch of communication of intention to grant |
Free format text: ORIGINAL CODE: EPIDOS AGRA |
|
GRAG | Despatch of communication of intention to grant |
Free format text: ORIGINAL CODE: EPIDOS AGRA |
|
GRAG | Despatch of communication of intention to grant |
Free format text: ORIGINAL CODE: EPIDOS AGRA |
|
GRAH | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOS IGRA |
|
GRAH | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOS IGRA |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 69721743 Country of ref document: DE Date of ref document: 20030612 Kind code of ref document: P |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20040210 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20090220 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20081231 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20081219 Year of fee payment: 12 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20091211 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20100831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20091231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100701 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20091211 |